Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Proceeding |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/40380/1/Employing%20Public%20-%20Copy.pdf http://ir.unimas.my/id/eprint/40380/ http://aiic.upm.edu.my/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.unimas.ir.40380 |
---|---|
record_format |
eprints |
spelling |
my.unimas.ir.403802023-10-06T02:00:10Z http://ir.unimas.my/id/eprint/40380/ Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure Nayeem Ahmad, Khan Adnan Shahid, Khan Seleviawati, Tarmizi Azlina, Ahmadi Julaihi Zeeshan, Ahmad QA76 Computer software —The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. The significant challenge faced is the attack on these protocols. Among the reported attacks on TSL is the Drown attack which is a prevalent type of attack. In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. The proposed method removes the need for credentials, including client-server certificates and client-server key exchange. 2022-05-18 Proceeding PeerReviewed text en http://ir.unimas.my/id/eprint/40380/1/Employing%20Public%20-%20Copy.pdf Nayeem Ahmad, Khan and Adnan Shahid, Khan and Seleviawati, Tarmizi and Azlina, Ahmadi Julaihi and Zeeshan, Ahmad (2022) Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure. In: AiIC2022: Applied Informatics International Conference 2022, 18-19 MAY 2022, UPM MALAYSIA-VIRTUAL CONFERENCE. http://aiic.upm.edu.my/ |
institution |
Universiti Malaysia Sarawak |
building |
Centre for Academic Information Services (CAIS) |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sarawak |
content_source |
UNIMAS Institutional Repository |
url_provider |
http://ir.unimas.my/ |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Nayeem Ahmad, Khan Adnan Shahid, Khan Seleviawati, Tarmizi Azlina, Ahmadi Julaihi Zeeshan, Ahmad Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure |
description |
—The Transport Layer ensures that data is sent
transparently between end-users while also enabling reliable
data transfer services to the higher levels. Cryptographic
protocols Secure Socket Layer (SSL) and Transport Layer
Security (TLS) enable data encryption and authentication
between various homogeneous and heterogeneous devices such
as servers, computers, and software applications running all
over a network. These protocols have been successfully used to protect World Wide Web communication between a client and
a server that has been encoded using the HTTP protocol for
many years. When communicating between client and server,
these algorithms address challenges like confidentiality,
integrity, availability, and non-repudiation. The significant challenge faced is the attack on these protocols. Among the reported attacks on TSL is the Drown attack which is a prevalent type of attack. In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. The proposed method removes the need for credentials, including client-server certificates and client-server key exchange. |
format |
Proceeding |
author |
Nayeem Ahmad, Khan Adnan Shahid, Khan Seleviawati, Tarmizi Azlina, Ahmadi Julaihi Zeeshan, Ahmad |
author_facet |
Nayeem Ahmad, Khan Adnan Shahid, Khan Seleviawati, Tarmizi Azlina, Ahmadi Julaihi Zeeshan, Ahmad |
author_sort |
Nayeem Ahmad, Khan |
title |
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure |
title_short |
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure |
title_full |
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure |
title_fullStr |
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure |
title_full_unstemmed |
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure |
title_sort |
employing public key infrastructure to encapsulate messages during transport layer security handshake procedure |
publishDate |
2022 |
url |
http://ir.unimas.my/id/eprint/40380/1/Employing%20Public%20-%20Copy.pdf http://ir.unimas.my/id/eprint/40380/ http://aiic.upm.edu.my/ |
_version_ |
1779150707108085760 |
score |
13.154949 |